Cargando…

Post-Quantum Cryptography Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings /

This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are pr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Buchmann, Johannes (Editor ), Ding, Jintai (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2008.
Edición:1st ed. 2008.
Colección:Security and Cryptology ; 5299
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
  • Square-Vinegar Signature Scheme
  • Attacking and Defending the McEliece Cryptosystem
  • McEliece Cryptosystem Implementation: Theory and Practice
  • Merkle Tree Traversal Revisited
  • Explicit Hard Instances of the Shortest Vector Problem
  • Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ?IC-Derivatives
  • Digital Signatures Out of Second-Preimage Resistant Hash Functions
  • Cryptanalysis of Rational Multivariate Public Key Cryptosystems
  • Syndrome Based Collision Resistant Hashing
  • Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems
  • On the Power of Quantum Encryption Keys
  • Secure PRNGs from Specialized Polynomial Maps over Any
  • MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy
  • Side Channels in the McEliece PKC.